Visual Contextual Attack: Jailbreaking MLLMs with Image-Driven Context Injection Authors: Ziqi Miao, Yi Ding, Lijun Li, Jing Shao | Published: 2025-07-03 2025.07.03 2025.07.05 Literature Database
Early Signs of Steganographic Capabilities in Frontier LLMs Authors: Artur Zolkowski, Kei Nishimura-Gasparian, Robert McCarthy, Roland S. Zimmermann, David Lindner | Published: 2025-07-03 2025.07.03 2025.07.05 Literature Database
CyberRAG: An agentic RAG cyber attack classification and reporting tool Authors: Francesco Blefari, Cristian Cosentino, Francesco Aurelio Pironti, Angelo Furfaro, Fabrizio Marozzo | Published: 2025-07-03 2025.07.03 2025.07.05 Literature Database
Evaluating Language Models For Threat Detection in IoT Security Logs Authors: Jorge J. Tejero-Fernández, Alfonso Sánchez-Macián | Published: 2025-07-03 2025.07.03 2025.07.05 Literature Database
EIM-TRNG: Obfuscating Deep Neural Network Weights with Encoding-in-Memory True Random Number Generator via RowHammer Authors: Ranyang Zhou, Abeer Matar A. Almalky, Gamana Aragonda, Sabbir Ahmed, Filip Roth Trønnes-Christensen, Adnan Siraj Rakin, Shaahin Angizi | Published: 2025-07-03 2025.07.03 2025.07.05 Literature Database
Empowering Manufacturers with Privacy-Preserving AI Tools: A Case Study in Privacy-Preserving Machine Learning to Solve Real-World Problems Authors: Xiaoyu Ji, Jessica Shorland, Joshua Shank, Pascal Delpe-Brice, Latanya Sweeney, Jan Allebach, Ali Shakouri | Published: 2025-07-02 2025.07.02 2025.07.04 Literature Database
Tuning without Peeking: Provable Privacy and Generalization Bounds for LLM Post-Training Authors: Ismail Labiad, Mathurin Videau, Matthieu Kowalski, Marc Schoenauer, Alessandro Leite, Julia Kempe, Olivier Teytaud | Published: 2025-07-02 2025.07.02 2025.07.04 Literature Database
Graph Representation-based Model Poisoning on Federated LLMs in CyberEdge Networks Authors: Hanlin Cai, Haofan Dong, Houtianfu Wang, Kai Li, Ozgur B. Akan | Published: 2025-07-02 2025.07.02 2025.07.04 Literature Database
A Privacy-Preserving Indoor Localization System based on Hierarchical Federated Learning Authors: Masood Jan, Wafa Njima, Xun Zhang | Published: 2025-07-02 2025.07.02 2025.07.04 Literature Database
SafePTR: Token-Level Jailbreak Defense in Multimodal LLMs via Prune-then-Restore Mechanism Authors: Beitao Chen, Xinyu Lyu, Lianli Gao, Jingkuan Song, Heng Tao Shen | Published: 2025-07-02 2025.07.02 2025.07.04 Literature Database